@conference { ISI:000381755100008,
title = {A Bargaining Nash Game Based Adaptive Negotiation of Context Level Agreements for Pervasive Systems},
booktitle = {ADVANCES IN UBIQUITOUS NETWORKING},
series = {Lecture Notes in Electrical Engineering},
volume = {366},
year = {2016},
note = {International Symposium on Ubiquitous Networking (UNet), Casablanca, MOROCCO, SEP 08-10, 2015},
pages = {91-104},
abstract = {With the growing popularity of Internet-enabled devices, the impressive progress in sensing technology, and the adoption of cloud computing for provisioning services, users increasingly demand services that can adapt to their recent context. In this paper, we propose, a multi-attributes and adaptive approach for Context Level Agreements (CLAs) negotiation between a context provider and a context consumer using a context broker. The approach employs a Nash bargaining model and evaluates the global utility of each party as a linear function of normalized Quality of Context (QoC) attributes during the rounds of negotiation. The ultimate goal is to improve context-based adaptation of context-aware applications and services. One of the advantages of this approach is that it permits to resolve conflicts of interests between the context provider and the context consumer when the global utility of each party reaches a Pareto optimum.},
isbn = {978-981-287-990-5; 978-981-287-989-9},
issn = {1876-1100},
doi = {10.1007/978-981-287-990-5\_8},
author = {Routaib, Hayat and Badidi, Elarbi and Sabir, Essaid and Elkoutbi, Mohammed},
editor = {Sabir, E and Medromi, H and Sadik, M}
}
@conference { ISI:000385280000021,
title = {OLSR-RAIP5: Optimized Link State Routing with Redundant Array of Independent Paths 5},
booktitle = {PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION \& COMMUNICATION TECHNOLOGIES 2015 (MEDCT 2015), VOL 2},
series = {Lecture Notes in Electrical Engineering},
volume = {381},
year = {2016},
note = {Mediterranean Conference on Information and Communication Technologies (MedCT), Saidia, MOROCCO, MAY 07-09, 2015},
pages = {201-210},
abstract = {The improvement of data routing performances and security in mobile networks mainly depends on the quality and type of message transmitted and also on the routing algorithms used. In Mobile Adhoc Networks (MANET), there are a lot of constraints that must be considered to improve quality and security of mobile communications. In this paper, we propose a new approach to enhance quality, reliability and security of mobile communications based on a multipath routing protocol inspired on the RAID5 technology. We propose a new algorithm for packet segmentation and routing data via multiple disjoint paths. This provides better security and ensures greater reliability of the information exchanged in a MANET. We have tested our proposition and done some simulations on the OLSR protocol which is widely used in context of MANETs. Through conducted simulations, we have shown that our proposed solution offers better reliability and security than the standard OLSR protocol.},
isbn = {978-3-319-30298-0; 978-3-319-30296-6},
issn = {1876-1100},
doi = {10.1007/978-3-319-30298-0\_21},
author = {Echchaachoui, Adel and Elmahdi, Fatna and Elkoutbi, Mohammed},
editor = {ElOualkadi, A and Choubani, F and ElMoussati, A}
}
@article { ISI:000372275400001,
title = {Vertical Handover Decision Algorithm Using Ants{\textquoteright} Colonies for 4G Heterogeneous Wireless Networks},
journal = {JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS},
year = {2016},
abstract = {With the development of 4G mobile telecommunication systems, providing users with the convenience of a seamless continuous connection is not enough anymore. Users want to be connected through the best available network with the best quality of service. It is necessary to have a good decision-making algorithm which decides whether it is necessary to perform handoff to another network, the best network to vertically perform handoff to, and the right time to initiate the handover. This paper proposes a new approach in which mobile terminals (MTs) continuously analyze the network and keep a database of the best available networks. The concept is based on QoS aware ant colony built on the vertical handoff mechanism that uses an updated version of ants{\textquoteright} colony optimization decision algorithm (ACO(R)), the dynamic and static factors such as RSS, the cost of service, bandwidth, the velocity of MT, the power consumption and security, and the module for predicting the traveling distance within an IEEE 802.11 WLAN cell. Simulation results show that we can not only meet the individual needs of users in terms of QoS, but also improve the whole system performance by reducing the number of handover failures and unnecessary handover instances by up to 95\%.},
issn = {2090-7141},
doi = {10.1155/2016/6259802},
author = {El Fachtali, Imad and Saadane, Rachid and Elkoutbi, Mohammed}
}
@article {11338540020160228,
title = {Vertical Handover Decision Algorithm Using Ants{\textquoteright} Colonies for 4G Heterogeneous Wireless Networks.},
journal = {Journal of Computer Networks \& Communications},
year = {2016},
pages = {1 - 15},
abstract = {With the development of 4G mobile telecommunication systems, providing users with the convenience of a seamless continuous connection is not enough anymore. Users want to be connected through the best available network with the best quality of service. It is necessary to have a good decision-making algorithm which decides whether it is necessary to perform handoff to another network, the best network to vertically perform handoff to, and the right time to initiate the handover. This paper proposes a new approach in which mobile terminals (MTs) continuously analyze the network and keep a database of the best available networks. The concept is based on QoS aware ant colony built on the vertical handoff mechanism that uses an updated version of ants{\textquoteright} colony optimization decision algorithm (ACOR), the dynamic and static factors such as RSS, the cost of service, bandwidth, the velocity of MT, the power consumption and security, and the module for predicting the traveling distance within an},
keywords = {Ant algorithms, Bandwidths, Quality of service, Roaming (Telecommunication), Wireless sensor networks},
issn = {20907141},
url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=113385400\&site=ehost-live},
author = {El Fachtali, Imad and Saadane, Rachid and Elkoutbi, Mohammed}
}
@article { ISI:000365532800014,
title = {A New Efficient and Energy-aware Clustering Algorithm for the OLSR Protocol},
journal = {INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY},
volume = {15},
number = {7},
year = {2015},
month = {JUL 30},
pages = {85-91},
abstract = {Integrating quality of service (QoS) in a mobile ad hoc network (MANET) is a difficult challenge and a very tedious task. It requires to find a compromise between several QoS parameters. The energy criterion is one of the most important of these parameters that will provide a long lifetime for a given MANET. This paper proposes a new clustering algorithm for the OLSR routing protocol which consumes less energy and enhances transmission delay. This algorithm manages nodes density and mobility; and gives major improvements regarding the number of elected clusters Head. We have conducted some comparison with other clustering algorithms to prove the efficiency of our algorithm. Our main objective is to elect a reasonable number of clusters Head that will serve for hierarchical routing using OLSR as a routing protocol. The second objective is to increase the network lifetime by considering the Ad hoc residual energy when taking routing decisions. We have found that our algorithm optimize the end to end delay by adopting a selective forwarding approach based on the hierarchical routing model},
issn = {1738-7906},
author = {Loutfi, Ahmed and Elkoutbi, Mohammed}
}
@conference { ISI:000380409500023,
title = {A New Trust Model to secure Routing Protocols against DoS attacks in MANETs},
booktitle = {2015 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA)},
year = {2015},
note = {10th International Conference on Intelligent Systems - Theories and Applications (SITA), ENSIAS, Rabat, MOROCCO, OCT 20-21, 2015},
publisher = {IEEE},
organization = {IEEE},
abstract = {In mobile Ad hoc networks, data is transmitted in airspace between mobile entities without any centralized control. This environment offers many and very important services for mobile users. However, the level of security in this kind of network has not yet reached a significant level of maturity against the ferocious attacks. In this work, we present a new model to trust routing protocols communications in MANETs against DoS attacks. We have used the box plot theory to define accurately the threshold to detect a DoS attack and to reduce the number of false positives.},
isbn = {978-1-5090-0220-7},
author = {Echchaachoui, Adel and Kobbane, Abdellatif and Elkoutbi, Mohammed}
}
@article { ISI:000334054800007,
title = {An energy aware algorithm for OLSR clustering},
journal = {ANNALS OF TELECOMMUNICATIONS-ANNALES DES TELECOMMUNICATIONS},
volume = {69},
number = {3-4},
year = {2014},
month = {APR},
pages = {201-207},
abstract = {One of the important aspects of a mobile ad hoc network (MANET) is the limitation of the amount of available energy and the network lifetime. The tremendous amount of using mobile nodes in wireless communication medium makes energy efficiency a fundamental requirement for MANETs. In this paper, we propose a novel energy aware clustering algorithm for the optimized link state routing (OLSR) routing protocol. This algorithm takes into account the node density and mobility and gives major improvements regarding the number of elected cluster heads. Our objective is to elect a reasonable number of cluster heads that will serve for hierarchical routing based on OLSR. The proposed algorithm aims to increase the network lifetime by considering the ad hoc residual energy while taking routing decisions. It also optimizes the delay of carried flows by adopting a selective forwarding approach based on a hierarchical routing model.},
issn = {0003-4347},
doi = {10.1007/s12243-013-0411-6},
author = {Loutfi, Ahmed and Elkoutbi, Mohammed and BenOthman, Jalel and Kobbane, Abdellatif}
}
@conference { ISI:000367072600061,
title = {Modeling and Enforcing Security and Service Control Policies using FlexRFID Middleware Healthcare Scenarios},
booktitle = {2014 SCIENCE AND INFORMATION CONFERENCE (SAI)},
year = {2014},
note = {Science and Information Conference (SAI), Sci \& Informat Org, London, ENGLAND, AUG 27-29, 2014},
pages = {461-467},
publisher = {Microsoft; RK Trans2Cloud; Springer; IEEE Comp Soc, UKRI Sect; IEEE Computat Intelligence Soc, UKRI Sect; IEEE},
organization = {Microsoft; RK Trans2Cloud; Springer; IEEE Comp Soc, UKRI Sect; IEEE Computat Intelligence Soc, UKRI Sect; IEEE},
abstract = {RFID and WSN technologies are widely used in today{\textquoteright}s pervasive computing. In Wireless Sensor Networks, sensor nodes sense the physical environment and send the sensed data to the sink by multi-hops. WSN are used in many applications such as military and environment monitoring. In Radio Frequency Identification, a unique ID is assigned to a RFID tag which is associated with a real world object. RFID applications cover many areas such as Supply Chain Management (SCM), healthcare, library management, automatic toll collection, etc. The integration of both technologies will bring many advantages in the future of ubiquitous computing, through the provision of real-world tracking and context information about the objects. This will increase considerably the automation of an information system. In order to process the large volume of data captured by sensors and RFID readers in real time, a middleware solution is needed. This middleware should be designed in a way to allow the aggregation, filtering and grouping of the data captured by the hardware devices before sending them to the backend applications. In this paper we demonstrate how our middleware solution called FlexRFID handles large amount of RFID and sensor scan data, and executes applications{\textquoteright} business rules in real time through its policy-based Business Rules layer. The FlexRFID middleware provides easy addition and removal of hardware devices that capture data, as well as uses the business rules of the applications to control all its services. We demonstrate how the middleware controls some defined healthcare scenarios, and deals with the access control security concern to sensitive healthcare data through the use of policies.},
isbn = {978-0-9893193-1-7},
author = {El Khaddar, Mehdia Ajana and Chraibi, Mhammed and Harroud, Hamid and Boulmalf, Mohammed and Elkoutbi, Mohammed and Maach, Abdelilah}
}
@conference { ISI:000346142800015,
title = {Modeling and Evaluating a Cloudlet-based Architecture for Mobile Cloud Computing},
booktitle = {2014 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS: THEORIES AND APPLICATIONS (SITA{\textquoteright}14)},
year = {2014},
note = {9th International Conference on Intelligent Systems - Theories and Applications (SITA), Inst Natl Postes \& Telecommunicat, Rabat, MOROCCO, MAY 07-08, 2014},
publisher = {IEEE; IEEE Morocco},
organization = {IEEE; IEEE Morocco},
abstract = {With the rising popularity of Internet-enabled mobile devices, users are increasingly demanding better quality of service (QoS). However, the resources of these devices and their connectivity levels remain insufficient, even though they are improving, for offering acceptable levels of QoS to users. Cloud computing infrastructures offer large and scalable resources that allow shifting the physical location of computation and storage to the cloud. Nevertheless, the integration of mobile computing with cloud computing would not guarantee adequate levels of service for mobile users. It rather delivers scalability at the cost of higher delay and higher power consumption on the mobile device. Instead, using local resources based on users geographical locations has the potential to improve the performance and QoS for mobile users. In this paper, we present and study a centralized architecture that relies on the concept of local clouds, cloudlets, to leverage the geographical proximity of resources to mobile users and offer them a better user experience. We use a continuous time Markov-chain (CTMC) to model the different nodes of the architecture: user nodes, cloudlets, and the main cloud. We estimate the delay incurred in the proposed architecture by simulating search engine queries generated by mobile users using the CTMC state models. Initial simulation results show that the usage of a cloudlet-based architecture especially centralized architecture has an efficient gains in terms of latency delay and synchronisation mechanisms.},
isbn = {978-1-4799-3566-6},
author = {Routaib, Hayat and Elmachkour, Mouna and Sabir, Essaid and Badidi, Elarbi and Elkoutbi, Mohammed}
}
@conference { ISI:000378641000047,
title = {Policy Based Security Middleware as a Service},
booktitle = {2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD)},
year = {2014},
note = {2nd International Conference on Future Internet of Things and Cloud (FiCloud), Barcelona, SPAIN, AUG 27-29, 2014},
pages = {322-327},
publisher = {IEEE Comp Soc, Tech Comm Internet; IEEE Comp Soc},
organization = {IEEE Comp Soc, Tech Comm Internet; IEEE Comp Soc},
abstract = {Cloud computing is amongst the major topics researched in Computer Science. Cloud computing security is at the heart of the topic. The reason behind this is that, as a technology, cloud computing is a great alternative that allows companies to outsource the management of their computing resources. However, due to the security issues, the cloud technology is not reaching its full potential. In this paper we present a system that allows the enforcement of privacy, accountability, integrity, and availability in each one of cloud computing levels using software policies. We present and describe the architecture of the Policy-Based Security Middleware as a Service.},
isbn = {978-1-4799-4357-9},
doi = {10.1109/FiCloud.2014.57},
author = {Chraibi, Mhammed and Harroud, Hamid and El Khaddar, Mehdia Ajana and Elkoutbi, Mohammed and Maach, Abdelilah}
}
@conference { ISI:000310353000082,
title = {Emerging Wireless Technologies In E-Health},
booktitle = {2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)},
year = {2012},
note = {International Conference on Multimedia Computing and Systems (ICMCS), Tangiers, MOROCCO, MAY 10-12, 2012},
pages = {440-445},
publisher = {Morocco Sect MTT/AP Joint Chapter},
organization = {Morocco Sect MTT/AP Joint Chapter},
abstract = {In healthcare the importance of obtaining the right information, at the right time, irrespective of time and location dependency is very critical. Healthcare personnel need to access real-time medical data such as patient clinical histories, laboratory results, treatments, chronic diseases, medication, and insurance information. Therefore, healthcare is the most apt domain for the application of ubiquitous technologies. Ubiquitous health care aims at creating an environment where healthcare is available to everyone, everywhere through the use of technologies that would not only be pervasive but also be assimilated flawlessly in the daily lives. With large-scale wireless networks and mobile computing solutions, such as cellular 3G, Wi-Fi mesh, WiMAX, Bluetooth, RFID, and Wireless Sensor Networks, health care personnel can tap into vital information anywhere and at any time within the health care networks. Ubiquitous healthcare, although promising, there are myriad challenges associated with realizing its vision. This paper highlights some snapshots of current uses and future trends of various wireless communications in the healthcare domains, addresses their applications for e-health, states the challenges faced in a ubiquitous healthcare environment equipped with different wireless technologies, and how the resulting issues might be addressed by developing a framework that provides a flexible and convenient medical monitoring, consultation, and healthcare.},
isbn = {978-1-4673-1520-3},
author = {El Khaddar, Mehdia Ajana and Harroud, Hamid and Boulmalf, Mohammed and Elkoutbi, Mohammed and Habbani, Ahmed},
editor = {Essaaidi, M and Zaz, Y}
}
@conference { ISI:000310937500040,
title = {A Dynamic Timestamp Discrepancy against Replay Attacks in MANET},
booktitle = {INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT IV},
series = {Communications in Computer and Information Science},
volume = {254},
year = {2011},
note = {International Conference on Informatics Engineering and Information Science (ICIEIS 2011), Univ Teknol Malaysia, Kuala Lumpur, MALAYSIA, NOV 14-16, 2011},
pages = {479+},
publisher = {Springer},
organization = {Springer},
abstract = {Mobile Ad hoc NETworks (MANETs), like traditional networks, are vulnerable to a wide range of Denial-of-Service (DoS) attacks. A Replay attack is one of them that degrade severely the MANET performance. A replay attacker performs this attack by interception and retransmission of the valid signed messages. The validation of signed messages is verified by a timestamp discrepancy fixed by sender and receiver nodes. In this paper, we propose an enhancement of the timestamp concept, to avoid replay attack, characterized by two properties. The first is dynamic because it depends on the communication duration between sender and receiver nodes. The second is rigid because it estimates approximately the maximum date when the signed message should arrive to receive node.},
isbn = {978-3-642-25482-6; 978-3-642-25483-3},
issn = {1865-0929},
author = {Enneya, Nourddine and Baayer, Aziz and Elkoutbi, Mohammed},
editor = {AbdManaf, A and Sahibuddin, S and Ahmad, R and Daud, SM and ElQawasmeh, E}
}
@conference { ISI:000303188300041,
title = {New Method: Mapping of 802.11e into MPLS Domains, Conception and Experimentation},
booktitle = {DIGITAL INFORMATION PROCESSING AND COMMUNICATIONS, PT 2},
series = {Communications in Computer and Information Science},
volume = {189},
year = {2011},
note = {International Conference on Digital Information Processing and Communications (ICDIPC 2011), VSB Tech Univ Ostrava, Ostrava, CZECH REPUBLIC, JUL 07-09, 2011},
pages = {470-483},
publisher = {Springer; VSB Tech Univ Ostrava; Soc Digital Informat \& Wireless Commun},
organization = {Springer; VSB Tech Univ Ostrava; Soc Digital Informat \& Wireless Commun},
abstract = {Mapping between two heterogeneous networks, Multi Protocol Label Switching (MPLS) and IEEE 802.11e is choice of future technology as it has ability to perform traffic engineering and create the corresponds between LSP (Label Switch Path) and AC (Access Category). This paper discusses the mapping between IEEE 802.11 MPLS integration to achieve quality of service on MPLS networks. MPLS and 802.11e is very useful approach for today{\textquoteright}s internet to ensure the Quality of service the end to end. It talks about different approaches to map 802.11 e Access Categories (AC) to Label Switched Path (LSP) and their advantages. It then introduces the concept of encapsulated LSPs to achieve future QoS, which requires further study to examine its practicability.},
isbn = {978-3-642-22409-6},
issn = {1865-0929},
author = {Oubaha, Jawad and Echchaachoui, Adel and Ouacha, Ali and Elkoutbi, Mohammed},
editor = {Snasel, V and Platos, J and ElQawasmeh, E}
}
@conference { ISI:000279656200056,
title = {Game Theory Approach for Enhancing QoS-Aware Routing in Mobile Ad hoc Networks},
booktitle = {NDT: 2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKED DIGITAL TECHNOLOGIES},
year = {2009},
note = {1st International Conference on Networked Digital Technologies (NDT 2009), VSB Tech Univ Ostrava, Fac Elect Engn \& Comp Sci, Ostrava, CZECH REPUBLIC, JUL 28-31, 2009},
pages = {327-333},
publisher = {IEEE Commun Soc},
organization = {IEEE Commun Soc},
abstract = {The dynamic nature of Mobile Ad hoc Networks (MANETs) is attributed to several inherent characteristics, such as variable link behavior, node movements and changing network topology. Providing Quality of Service (QoS) in such a dynamic environment is very difficult. QoS-aware routing is one of the QoS support that provides QoS at the network layer In the presence of high mobility, this QoS solution can be down. Furthermore, taking mobility in consideration can enhance and guarantee it. In this paper, we propose a cooperative game theory approach to extract a core in MA NET that is stable in terms of mobility. This core is a subset of MANET mobile nodes where his mobility is less and stable. The selection of paths by the QoS-aware routing protocols through this extracted core can be ensure more the provided QoS in time.},
isbn = {978-1-4244-4614-8},
author = {Enneya, Nourddine and Elmeziane, Rachid and Elkoutbi, Mohammed}
}
@article {4562825420091002,
title = {Resource Optimization of Mobile Intelligent System With Heart MPLS Network.},
journal = {International Journal of Interactive Mobile Technologies},
volume = {3},
number = {S2},
year = {2009},
pages = {58 - 64},
abstract = {In this paper, we introduce the original Mobile Intelligent System (MIS) in embedded FPGA architecture. This node will allow the construction of autonomous mobile network units which can move in unknowns, inaccessible or hostile environment for human beings, in order to collect data by various sensors and transmits them by routing to a unit of distant process. For the sake of improving the performance of transmission, we propose a global schema of QoS management using DiffServ/MPLS backbones. We provide an evaluation of several scenarios for combining QoS IP networks with MIS access network. We conclude with a study on interoperability between QoS patterns in access and backbone networks. [ABSTRACT FROM AUTHOR]},
keywords = {Artificial intelligence, Computer architecture, DiffServ and MPLS, Information networks, intelligent sensors, Mobile communication systems, Quality of service, Routing (Computer network management) {\textendash} Equipment \& supplies, wireless sensor network},
issn = {18657923},
url = {http://search.ebscohost.com/login.aspx?direct=true\&db=iih\&AN=45628254\&site=ehost-live},
author = {Oubaha, Jawad and Habbani, Ahmed and Elkoutbi, Mohammed}
}
@conference { ISI:000261578001102,
title = {802.11 Mobile Networks Combined to QoS IP Networks},
booktitle = {2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5},
year = {2008},
note = {3rd International Conference on Information and Communication Technologies, Damascus, SYRIA, APR 07-11, 2008},
pages = {2176-2180},
abstract = {In Internet user{\textquoteright}s traffic crosses several areas. Increasingly, users are demanding quality of service (QoS) from beginning to end. Therefore, it is necessary to have a global schema of differentiation not only in the areas which make up the network backbone, but also in access networks that are also often bottlenecks. In this paper, we propose a global schema of QoS management Using DiffServ/MPLS backbones and 802.11 wireless access networks. We provide an evaluation of several scenarios for combining QoS IP networks with 802.11 access network. We conclude with a study on interoperability between QoS patterns in access and backbone networks.},
isbn = {978-1-4244-1751-3},
author = {Oubaha, Jawad and Elkoutbi, Mohammed}
}